Energy/Area-Efficient Scalar Multiplication with Binary Edwards Curves for the IoT

被引:7
作者
Andres Lara-Nino, Carlos [1 ]
Diaz-Perez, Arturo [2 ]
Morales-Sandoval, Miguel [1 ]
机构
[1] CINVESTAV Tamaulipas, Victoria 87130, Mexico
[2] CINVESTAV Guadalajara, Zapopan 45019, Mexico
关键词
elliptic curve cryptography; low-power; low-energy; binary Edwards curves; scalar multiplication; internet of things; wireless sensor networks; lightweight cryptography; LOW-POWER; AUTHENTICATION PROTOCOL; USER AUTHENTICATION; RFID TAG; CRYPTOGRAPHY; SECURITY; ECC; PROCESSOR;
D O I
10.3390/s19030720
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Making Elliptic Curve Cryptography (ECC) available for the Internet of Things (IoT) and related technologies is a recent topic of interest. Modern IoT applications transfer sensitive information which needs to be protected. This is a difficult task due to the processing power and memory availability constraints of the physical devices. ECC mainly relies on scalar multiplication (kP)-which is an operation-intensive procedure. The broad majority of kP proposals in the literature focus on performance improvements and often overlook the energy footprint of the solution. Some IoT technologies-Wireless Sensor Networks (WSN) in particular-are critically sensitive in that regard. In this paper we explore energy-oriented improvements applied to a low-area scalar multiplication architecture for Binary Edwards Curves (BEC)-selected given their efficiency. The design and implementation costs for each of these energy-oriented techniques-in hardware-are reported. We propose an evaluation method for measuring the effectiveness of these optimizations. Under this novel approach, the energy-reducing techniques explored in this work contribute to achieving the scalar multiplication architecture with the most efficient area/energy trade-offs in the literature, to the best of our knowledge.
引用
收藏
页数:35
相关论文
共 55 条
[11]  
Dan Y., 2012, P 2012 8 INT C WIR C, P1
[12]  
De Clercq R., 2014, P 51 ANN DES AUT C D
[13]   Extending the IEEE 802.15.4 Security Suite with a Compact Implementation of the NIST P-192/B-163 Elliptic Curves [J].
de la Piedra, Antonio ;
Braeken, An ;
Touhafi, Abdellah .
SENSORS, 2013, 13 (08) :9704-9728
[14]  
Fan J., 2013, 2013 IEEE SOI-3D-Subthreshold Microelectronics Technology Unified Conference (S3S), P1, DOI DOI 10.1109/S3S.2013.6716583
[15]   State of the art in ultra-low power public key cryptography for wireless sensor networks [J].
Gaubatz, G ;
Kaps, JP ;
Öztürk, E ;
Sunar, B .
Third IEEE International Conference on Pervasive Computing and Communications, Workshops, 2005, :146-150
[16]   Optimal energy aware clustering in sensor networks [J].
Ghiasi, S ;
Srivastava, A ;
Yang, XJ ;
Sarrafzadeh, M .
SENSORS, 2002, 2 (07) :258-269
[17]  
Guajardo J., 2005, ENCY CRYPTOGRAPHY SE, P313
[18]  
Hein D, 2009, LECT NOTES COMPUT SC, V5381, P401, DOI 10.1007/978-3-642-04159-4_26
[19]   A FAST ALGORITHM FOR COMPUTING MULTIPLICATIVE INVERSES IN GF(2M) USING NORMAL BASES [J].
ITOH, T ;
TSUJII, S .
INFORMATION AND COMPUTATION, 1988, 78 (03) :171-177
[20]  
Iwasaki A., 2015, P 2015 IEEE S LOW PO